CVE-2014-4113
- Reference to the description:
- Description:
- win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."
- Last updated date:
- 12/20/2024
Reports
ACTIVELY EXPLOITED
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 10/14/2014
- Reference url to background
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-058
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 02/26/2019
- Reference url to background
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 05/04/2022
- Reference url to background
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 11/19/2014
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 01/22/2016
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 02/07/2016
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 02/26/2019
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 02/26/2019
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 07/21/2021
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 07/02/2024
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 07/02/2024
- Reference url to background